Search:

Type: Posts; User: CrySys

Search: Search took 0.01 seconds.

  1. Replies
    3
    Views
    3,884

    A token of gratitude

    Thank you so much, Mr. b0nd. Your reply was very helpful :)
  2. Replies
    3
    Views
    3,884

    Here's my version

    Step 1: Identify the target and it's flaws. There are always flaws. This step requires a lot of arbitrary inputs providing.
    Step 2: Find the right exploit. Once you find the vulnerabilities, it's...
  3. Replies
    3
    Views
    3,884

    Steps in hacking an application

    Hi,
    Feels great to be a part of this awesome website.
    I'm a beginner, so, please bear with me.
    I am a high school student, a coder and a hacker.
    I have been hacking the web applications I make...
Results 1 to 3 of 3